Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

Microsoft Windows update cycle arrows with overlay a laptop and mobile phone.

Windows 10 security: Are you on the right version?

If you're running an older version of Windows 10, It's time to review security enhancements that later versions offer to see if you need to update.

A broken link in a digital chaing / weakness / vulnerability

The Windows Bad Neighbor vulnerability explained — and how to protect your network

Attackers could use the Windows Bad Neighbor vulnerability to perform remote code execution or create buffer overflows. Patches and workarounds are available.

mentor teach learn office computer

7 steps to ensure a successful CISO transition

CISOs can play a critical role transitioning their replacements to the job and build a great reputation in the process. Follow this advice to ensure security operations don't miss a beat.

Conceptual image of executives; silhouettes in motion with a virtual global network overlay.

Why CISOs must be students of the business

Technical expertise will only get you so far. To earn a seat at the executive table, today's CISOs need to understand their business.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

The 4 pillars of Windows network security

Microsoft's CISO breaks down which four key areas to focus on to secure Windows networks: passwordless identity management, patch management, device control and benchmarks.

video conferencing / remote work

8 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs?

QR code on mobile phone [CC0 image by Gerd Altmann via Pexels]

How attackers exploit QR codes and how to mitigate the risk

Attackers are taking advantage of the increased use of QR codes to steal sensitive information or conduct phishing campaigns. Here's what security teams and employees need to know.

Security system alert, warning of a cyberattack.

Common pitfalls in attributing cyberattacks

Attack attribution is always difficult as criminal groups often share code and techniques, and nation-state actors excel at deception. Here, security researchers share their techniques and common pitfalls.

Election security  >  Backlit hand drops a vote in a ballot box with US flag + binary code overlay

Late-game election security: What to watch and watch out for

Despite disruption of the Trickbot botnet network, last-minute leaks of stolen documents and post-election undermining of trust in the election system remain big concerns.

CSO > Azure automation for Let's Encrypt certificates

Azure Security Benchmark v2: What you need to know

Here's what Microsoft's new security benchmarks include and how they can help you better understand your Azure security posture.

businessman bridges gap

Taking aim at the cybersecurity skills shortage: 5 approaches to closing the gap

Programs have emerged to draw professionals into the field and prepare them for jobs, but their task is daunting.

A circuit board with CPU / chip displaying glowing binary code.

Homomorphic encryption tools find their niche

Current homomorphic encryption offerings require fewer specialized skills and are proving themselves effective in some use cases.

Facebook / network connections / privacy / security / breach / wide-eyed fear

How SilentFade group steals millions from Facebook ad spend accounts

SilentFade steals credentials and ad spend account information and sells the information to other bad actors. The group returned with improved malware after Facebook's initial mitigation efforts.

internet web browser https / url address bar

Silo for Safe Access: A more secure web browser for some use cases

Authentic8's Silo is a sandboxed web browser designed to protect users and systems from malicious code. It can be a more secure option than VPNs or virtual desktops in some cases.

flow chart diagram / planning / programming / development

6 steps to building a strong breach response plan

Cybersecurity resilience depends on having a detailed, thorough, and tested breach response plan in place. Here's how to get started.

RIP - grave - tombstone - cemetery - death [Image by Rob van der Meijden - CC0 via Pixabay]

Preparing for Flash and Office 2010 end-of-life

The imminent end of Microsoft's support for Adobe Flash is a good excuse to see what other end-of-life applications running on your Windows network could leave you vulnerable.

android trojan banking hack virus bank breach by etienne martin unsplash and google android

Alien malware a rising threat to mobile banking users

The Alien malware has quickly become a popular choice for cybercriminals to commit bank fraud. Here's why.

The open jaws of a spring trap lie in wait. [danger / risk]

Uber breach case a ‘watershed moment’ for CISOs’ liability risk

An upcoming case to determine whether the former Uber CSO failed to report a breach puts the legal liabilities of being a CISO in the spotlight. CISOs have a few options to minimize that risk.

A recking ball with exclamation point smashes into U.S. hundred-dollar bills.

7 overlooked cybersecurity costs that could bust your budget

Is your cybersecurity budget covering all the bases? Here's a look at seven expenses that budget planners often minimize or fail to address.

A businesswoman looks into the distance amid abstract technology, colleagues in background.

What it takes to be a transformational CISO

The skills and traits of effective change leaders.

Load More

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.